A Blockchain-Enabled Group Covert Channel against Transaction Forgery

Tongzhou Shen,Liehuang Zhu,Feng Gao,Zhuo Chen,Zijian Zhang,Meng Li
DOI: https://doi.org/10.3390/math12020251
IF: 2.4
2024-01-13
Mathematics
Abstract:As a decentralized network infrastructure, the data sent to the blockchain are public and temper-evident. The cover of massive normal transactions in a blockchain network is ideal for constructing a stable and reliable covert channel to achieve one-to-many group covert communication. Existing blockchain-based covert communication schemes face challenges in balancing concealment, embedding rate and filtering efficiency, making them unsuitable for direct extension to group scenarios. Adopting a key-leakage scheme can increase the channel capacity while maintaining high concealment from external adversaries. However, it will also expose more knowledge to the receiver. A malicious receiver has the ability to steal a sender's identity or replay historical transactions to control the entire channel. In this paper, we define the capabilities of malicious receivers in blockchain-based group covert communication scenarios and propose a group covert communication scheme resistant to transaction forgery attacks. Theoretical analysis and experiments prove that our covert transactions do not have any transaction correlativity, ensuring the unique authenticity of the sender's identity while maintaining supreme concealment compared with the existing schemes. The precision and recall of machine learning detection results can reach 0.57–0.62 (0.5 is the ideal value).
mathematics
What problem does this paper attempt to address?
### Problems the paper attempts to solve This paper aims to solve the problem of transaction forgery attacks in group - based covert communication scenarios in blockchain networks. Specifically, the paper focuses on blockchain covert communication where multiple receivers or receiver groups exist. Internal adversaries may use the known knowledge of receivers to forge transactions, thereby deceiving other receivers, transmitting false information, and even replaying historical transactions, which undermines the timeliness of messages. These problems make the existing covert communication schemes insufficient in the face of internal adversaries and unable to effectively prevent identity forgery and transaction replay attacks. ### Main contributions 1. **Proposed a new blockchain group covert communication model**: - Considering the threat of internal adversaries, it lays the foundation for solving the risks of transaction detection and identity forgery. 2. **Designed a message embedding and transaction filtering mechanism**: - It realizes data covert embedding and extraction, while ensuring the unlinkability between transactions, enhancing the concealment of covert transactions. - It realizes an identity authentication mechanism based on BLS signatures within the limited blockchain transaction storage space, ensuring that the sender's identity is uniquely verifiable and solving the risks of identity forgery and replay attacks by internal adversaries. 3. **Prototype system implementation and evaluation**: - The experimental results show that, compared with existing methods, this scheme can resist the identity forgery attacks of internal adversaries, has higher concealment against external adversaries, and provides a higher channel capacity with an acceptable cost. ### Key technologies 1. **BLS short signature**: - The sender generates an identity authentication signature, and the receiver uniquely determines the message source according to the validity and timeliness of the signature, excluding the interference of internal adversaries. 2. **Message embedding and transaction filtering algorithm combining Kleptography and ECDH**: - By integrating these two technologies and embedding the identity authentication signature in the transaction, an effective blockchain group covert communication scheme is finally designed. ### Privacy and security - **Concealment**: Covert transactions should be indistinguishable. Internal adversaries cannot identify transactions sent to other groups, and external adversaries cannot distinguish between covert transactions and ordinary transactions. - **Practicality**: Covert transactions should be sent and filtered efficiently. The filtering time should be less than the time required to generate a new block, and the time cost of information embedding and extraction should be acceptable. - **Non - forgery**: In covert communication, the sender's identity should be uniquely verifiable, and internal adversaries cannot use receiver parameters to forge sender transactions. - **Capacity**: Covert communication should provide sufficient channel capacity while ensuring concealment, practicality, and non - forgery. ### Conclusion By introducing new identity authentication mechanisms and message embedding algorithms, this paper effectively solves the threat of internal adversaries in blockchain group covert communication, improves the security and concealment of the channel, and provides a new direction for future related research.